click to show more information

click to hide/show information About your Search

20130201
20130228
Search Results 0 to 6 of about 7 (some duplicates have been removed)
concluded with the source of many of these attacks is. the pentagon as stuff for a long time is sicily every major corporation has been attacked by the people's liberation army. so what the chinese are doing is looking for their asymmetric point advantage. they cannot match as in conventional forces and nuclear forces are made it -- naval forces, so they're going after our vulnerability, reliance on information technology. they're way ahead of us in this area. gerri: the president put out an executive order. some vines are something silly. >> sillies exactly right. look. dealing with commercial espionage is apiece through legal means, we have to understand that for china, russia, other countries, this is a form of warfare. i'm not suggesting that the government takeover information security, but i think there are areas where government private-sector cooperation here is important. how to create defenses and for the government, what kind of offense cyber capability we need to deter the chinese and others from doing this. gerri: there are all kinds of different levels. there is out endowed int
Search Results 0 to 6 of about 7 (some duplicates have been removed)